default search action
Sebastian Herold
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Bilal Maqbool, Sebastian Herold:
Potential effectiveness and efficiency issues in usability evaluation within digital health: A systematic literature review. J. Syst. Softw. 208: 111881 (2024) - [c45]Bilal Maqbool, Farzaneh Karegar, Sebastian Herold:
A Survey on Usability Evaluation in Digital Health and Potential Efficiency Issues. BIOSTEC (2) 2024: 63-76 - [c44]Bilal Maqbool, Laoa Jalal, Sebastian Herold:
Towards Using Synthetic User Interaction Data in Digital Healthcare Usability Evaluation. BIOSTEC (2) 2024: 595-603 - [c43]Stefan H. A. Wittek, Sebastian Herold, Andreas Rausch:
Introduction to the Minitrack on AI-based Methods and Applications for Software Engineering. HICSS 2024: 7290-7291 - [c42]Alexander Florean, Jonas Forsman, Sebastian Herold:
On Population Fidelity as an Estimator for the Utility of Synthetic Training Data. SCAI 2024: 141-150 - 2023
- [c41]Zipani Tom Sinkala, Sebastian Herold:
Investigating the Effect of Partial and Real-Time Feedback in INMAP Code-To-Architecture Mapping. FedCSIS 2023: 749-758 - [c40]Zipani Tom Sinkala, Sebastian Herold:
An Integrated Approach to Package and Class Code- to-Architecture Mapping Using InMap. ICSA 2023: 164-174 - [c39]Sebastian Herold, Zipani Tom Sinkala:
Using Automatically Recommended Seed Mappings for Machine Learning-Based Code-to-Architecture Mappers. SAC 2023: 1432-1439 - 2021
- [c38]Bilal Maqbool, Sebastian Herold:
Challenges in Developing Software for the Swedish Healthcare Sector. HEALTHINF 2021: 175-187 - [c37]Alexander Florean, Laoa Jalal, Zipani Tom Sinkala, Sebastian Herold:
A Comparison of Machine Learning-Based Text Classifiers for Mapping Source Code to Architectural Modules. ECSA (Companion) 2021 - [c36]Zipani Tom Sinkala, Sebastian Herold:
Towards Hierarchical Code-to-Architecture Mapping Using Information Retrieval. ECSA (Companion) 2021 - [c35]Zipani Tom Sinkala, Sebastian Herold:
Hierarchical Code-to-Architecture Mapping. ECSA (Tracks and Workshops) 2021: 86-104 - [c34]Zipani Tom Sinkala, Sebastian Herold:
InMap: Automated Interactive Code-to-Architecture Mapping Recommendations. ICSA 2021: 173-183 - [c33]Zipani Tom Sinkala, Sebastian Herold:
InMap: automated interactive code-to-architecture mapping. SAC 2021: 1439-1442 - 2020
- [c32]Sebastian Herold:
An Initial Study on the Association Between Architectural Smells and Degradation. ECSA 2020: 193-201
2010 – 2019
- 2019
- [j9]Jörg Lenhard, Martin Blom, Sebastian Herold:
Exploring the suitability of source code metrics for indicating architectural inconsistencies. Softw. Qual. J. 27(1): 241-274 (2019) - [c31]Michael Colesky, Katerina Demetzou, Lothar Fritsch, Sebastian Herold:
Helping Software Architects Familiarize with the General Data Protection Regulation. ICSA Companion 2019: 226-229 - 2018
- [j8]Nour Ali, Seán Baker, Ross O'Crowley, Sebastian Herold, Jim Buckley:
Architecture consistency: State of the practice, challenges and requirements. Empir. Softw. Eng. 23(1): 224-258 (2018) - [j7]Nour Ali, Seán Baker, Ross O'Crowley, Sebastian Herold, Jim Buckley:
Erratum to: Architecture consistency: State of the practice, challenges and requirements. Empir. Softw. Eng. 23(3): 1868-1869 (2018) - [j6]Elaine Dobell, Sebastian Herold, Jim Buckley:
Spreadsheet Error Types and Their Prevalence in a Healthcare Context. J. Organ. End User Comput. 30(2): 20-42 (2018) - [c30]Zipani Tom Sinkala, Martin Blom, Sebastian Herold:
A mapping study of software architecture recovery for software product lines. ECSA (Companion) 2018: 49:1-49:7 - [c29]Simone Fischer-Hübner, Leonardo A. Martucci, Lothar Fritsch, Tobias Pulls, Sebastian Herold, Leonardo H. Iwaya, Stefan Alfredsson, Albin Zuccato:
A MOOC on Privacy by Design and the GDPR. World Conference on Information Security Education 2018: 95-107 - 2017
- [j5]Jens Knodel, Jim Buckley, Sebastian Herold:
The Need for an Open Corpus of Software Architecture Descriptions. Softwaretechnik-Trends 37(2) (2017) - [c28]Jörg Lenhard, Mohammad Mahdi Hassan, Martin Blom, Sebastian Herold:
Are code smell detection tools suitable for detecting architecture degradation? ECSA (Companion) 2017: 138-144 - [c27]Jörg Lenhard, Lothar Fritsch, Sebastian Herold:
A Literature Study on Privacy Patterns Research. SEAA 2017: 194-201 - 2016
- [c26]Jim Buckley, Jacek Rosik, Sebastian Herold, Asanka Wasala, Goetz Botterweck, Chris Exton:
FLINTS: a tool for architectural-level modeling of features in software systems. ECSA Workshops 2016: 14 - [c25]Sebastian Herold, Martin Blom, Jim Buckley:
Evidence in architecture degradation and consistency checking research: preliminary results from a literature review. ECSA Workshops 2016: 20 - 2015
- [j4]Jim Buckley, Nour Ali, Michael English, Jacek Rosik, Sebastian Herold:
Real-Time Reflexion Modelling in architecture reconciliation: A multi case study. Inf. Softw. Technol. 61: 107-123 (2015) - [c24]Sebastian Herold, Jim Buckley, Andreas Rausch:
Second Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon 2015). ECSA Workshops 2015: 55:1-55:2 - [c23]Sebastian Herold, Jim Buckley:
Feature-Oriented Reflexion Modelling. ECSA Workshops 2015: 59:1-59:7 - [c22]Howell R. Jordan, Jacek Rosik, Sebastian Herold, Goetz Botterweck, Jim Buckley:
Manually locating features in industrial source code: the search actions of software nomads. ICPC 2015: 174-177 - [c21]Sebastian Herold, Michael English, Jim Buckley, Steve Counsell, Mel Ó Cinnéide:
Detection of violation causes in reflexion models. SANER 2015: 565-569 - [c20]Steve Counsell, Xiaohui Liu, Steve Swift, Jim Buckley, Michael English, Sebastian Herold, Sigrid Eldh, Andreas Ermedahl:
An exploration of the 'introduce explaining variable' refactoring. XP Workshops 2015: 9 - 2014
- [c19]Sebastian Herold, Matthias Mair:
Recommending Refactorings to Re-establish Architectural Consistency. ECSA 2014: 390-397 - [c18]Matthias Mair, Sebastian Herold, Andreas Rausch:
Towards flexible automated software architecture erosion diagnosis and treatment. WICSA Companion 2014: 9:1-9:6 - [c17]Marco Körner, Sebastian Herold, Andreas Rausch:
Composition of applications based on software product lines using architecture fragments and component sets. WICSA Companion 2014: 13:1-13:4 - [p1]Sebastian Herold, Andreas Rausch:
A Rule-Based Approach to Architecture Conformance Checking as a Quality Management Measure. Relating System Quality and Software Architecture 2014: 181-207 - 2013
- [c16]Andreas Rausch, Christian Bartelt, Sebastian Herold, Holger Klus, Dirk Niebuhr:
From Software Systems to Complex Software Ecosystems: Model- and Constraint-Based Engineering of Ecosystems. Perspectives on the Future of Software Engineering 2013: 61-80 - [c15]Matthias Mair, Sebastian Herold:
Towards Extensive Software Architecture Erosion Repairs. ECSA 2013: 299-306 - [c14]Sebastian Herold, Matthias Mair, Andreas Rausch, Ingrid Schindler:
Checking Conformance with Reference Architectures: A Case Study. EDOC 2013: 71-80 - [c13]Sebastian Herold, Andreas Rausch:
Complementing model-driven development for the detection of software architecture erosion. MiSE 2013: 24-30 - 2012
- [c12]Benjamin Mensing, Ursula Goltz, Adina Aniculaesei, Sebastian Herold, Andreas Rausch, Stefan Gärtner, Kurt Schneider:
Towards integrated rule-driven software development for IT ecosystems. DEST 2012: 1-6 - [c11]Andreas Rausch, Jörg P. Müller, Dirk Niebuhr, Sebastian Herold, Ursula Goltz:
IT ecosystems: A new paradigm for engineering complex adaptive software systems. DEST 2012: 1-6 - 2011
- [b1]Sebastian Herold:
Architectural Compliance in Component-Based Systems. Clausthal University of Technology, 2011 - [j3]Sebastian Herold:
Compliance between Architecture and Design Models of Component-Based Systems. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 42 (2011) - 2010
- [c10]Patrick Dohrmann, Sebastian Herold:
Designing and Applying a Framework for Logic-Based Model Querying. EUROMICRO-SEAA 2010: 164-171 - [c9]Sebastian Herold:
Checking architectural compliance in component-based systems. SAC 2010: 2244-2251
2000 – 2009
- 2009
- [c8]Constanze Deiters, Patrick Dohrmann, Sebastian Herold, Andreas Rausch:
Rule-Based Architectural Compliance Checks for Enterprise Architecture Management. EDOC 2009: 183-192 - 2008
- [c7]Sebastian Herold, Holger Klus, Dirk Niebuhr, Andreas Rausch:
Engineering of IT ecosystems: design of ultra-large-scale software-intensive systems. ULSSIS@ICSE 2008: 49-52 - [c6]Sebastian Herold, Andreas Rausch, Alexander Bösl, Jan Ebell, Christian Linsmeier, Detlef Peters:
A Seamless Modeling Approach for Service-Oriented Information Systems. ITNG 2008: 438-446 - [c5]Sebastian Herold:
Towards Checking Architectural Rules in Component-Based Design. OTM Workshops 2008: 473-478 - 2007
- [j2]Anne-Thérèse Körtgen, Simon M. Becker, Sebastian Herold:
A Graph-Based Framework for Rapid Construction of Document Integration Tools. Trans. SDPS 11(4): 19-39 (2007) - [j1]Simon M. Becker, Sebastian Herold, Sebastian Lohmann, Bernhard Westfechtel:
A graph-based algorithm for consistency maintenance in incremental and interactive integration tools. Softw. Syst. Model. 6(3): 287-315 (2007) - [c4]Sebastian Herold, Holger Klus, Yannick Welsch, Constanze Deiters, Andreas Rausch, Ralf H. Reussner, Klaus Krogmann, Heiko Koziolek, Raffaela Mirandola, Benjamin Hummel, Michael Meisinger, Christian Pfaller:
CoCoME - The Common Component Modeling Example. CoCoME 2007: 16-53 - [c3]André Appel, Sebastian Herold, Holger Klus, Andreas Rausch:
Modelling the CoCoME with DisCComp. CoCoME 2007: 267-296 - [c2]Sebastian Herold, Andreas Metzger, Andreas Rausch, Heiko Stallbaum:
Towards Bridging the Gap between Goal-Oriented Requirements Engineering and Compositional Architecture Development. SHARK/ADI@ICSE 2007: 7 - 2006
- [c1]Christian Bartelt, Sebastian Herold:
Modellorientiertes Variantenmanagement. Modellierung 2006: 173-182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint